Profile pic is from Jason Box, depicting a projection of Arctic warming to the year 2100 based on current trends.

  • 0 Posts
  • 30 Comments
Joined 1 year ago
cake
Cake day: March 3rd, 2024

help-circle

  • I have cats, and two Eufys, one for each floor. I don’t run them every day since the cats are all shorthair and it takes a bit to add up, but it’s nice to just let it go for a bit and check in.

    And do that. Don’t assume the vacuum is strong enough to suck things all the way in. They can easily be clogged the first run through and then you’re just pushing crap around. Should carry the lesson over to any automation. Trust to a certain level, but know what it can and cannot do and when to step in.






  • First, no one knows if the picture is someone connected or a stolen cam footage to use. So we don’t know any identity. Could be automated or could be individually sent out. More important is the question of restrictions of postings in some way. How would one do this before the first attempts by each new user profile? When they first started there were a few other names used, but for whatever reason (ease or maybe enjoying the attention now) Nicole has become the one seen, through various instances that would each have to set up their own ban.

    As for what the point is, that could be asked of so many phishing and spam attempts. Often times they’re so bad that even if you wanted to, the links are incomplete or don’t make sense. Spam calls can be the same way. Usually letting them go to voicemail gets them to hang up before anything is left, but I’ve heard some live and recorded where it doesn’t even get through the spiel. What was the point? Maybe to establish a connection…or maybe just badly planned implementation.

    Anyway, no one knows yet about Nicole, and honestly if it wasn’t just the single name and picture/info, it would all just be part of the constant spam that’s out there. Perhaps “they” hit on a formula to retain recognition, but now just don’t know what to do with it.




  • Painful would be the several (!) times I had to check the computer over after they fell for a tech help scam and lost money. The stupid thing was that if someone tried to sell them something on the street or phone they were smart enough to refuse, but for some reason a popup on the computer makes things legit. Even after it was a scam the last time it happened. Why?

    There are many more lesser events that aren’t painful as much as just tedious, but I think having some patience and knowing what to tell them (vs. actually explaining it) helped. I tried to reduce the complexity and lock things down, but in the end it was just easier to come over and fix the problem every now and then.






  • Using it to share data can be a nightmare, especially since different departments might look at that data in various ways and want their own formats. I work for a Fortune 500 company that, at least at my level of management, emailing around attached full spreadsheets of daily data rather than have a centralized database. I’ve fought it for years, but it’s what the higher ups want…stupid.

    Even better when Microsoft puts out improvements like 365 and OneDrive that break certain functions, then depreciates Excel itself. God I hate the cloud.